Jump to content

Alok

Active Members
  • Posts

    5
  • Joined

  • Last visited

Profile Information

  • Gender
    Not Telling

Recent Profile Visitors

2,433 profile views

Alok's Achievements

Newbie

Newbie (1/14)

  1. Following may help: Web application Testing Guide (PDF) https://www.owasp.org/images/5/56/OWASP_Testing_Guide_v3.pdf More Inf here: https://www.owasp.org/index.php/OWASP_Testing_Project#tab=Old_OWASP_Testing_Guides
  2. Alok

    Changing IP via CMD

    Sure....I'll resolve the issue as soon as I get back to my place.... Thanks for your advice.... :)
  3. You can even Spoof your MAC in windows without using third party tools. however if tools is concerned then I would advice to use macshift 1) Open your Local Area Connection Status window and click on Properties. 2) In General tab of Local Area Connection Properties, click on Configure. 3) Then go to Advanced tab and click on NetworkAddress and check on the value option and give your fake mac address and click OK. Now open your command prompt and type ipconfig /all to check-out your new mac address. Note:To reset your MAC to original just Select the Radio button "Not Present" for Network Address
  4. Today one of the fastest medium used by malware for infection is removable drives. Worms used it to replicate faster, once your removal drive come in contact with infected system it gets infected automatically by the malicious services running in system, one of the first task done by malicious services is to create AUTORUN information file into Removable drive for further propagation. Now once you open these infected Removable Drives in any PC, AUTORUN file do there task, but question is How? Actually AUTORUN file contains code for executing infected executable file instantly which were copied earlier somewhere in Removable Drives by malicious services. The code within AUTORUN information file looks something like this: [AUTORUN] OPEN=recycler/setup.exe In the above script recycler is a folder in removal drives which contain infected executable file (copied earlier by malicious services) that is now being used by AUTORUN file for propagation. Here we can protect our Removal Drives against these worms by restricting changes to Autorun.inf file. Step1: Create four folders in the root directory of your Removable drive with name Autorun.inf, Recycle, Recycler and Recycled. Step2: Go to Start>Run and type cmd to open Command Prompt Step3: Now type below command one by one attrib autorun.inf /s /d –a +s +r cacls autorun.inf /c /d administrators Step4: Repeat Step3 for Recycle, Recycler and Recycled. Here in the above procedure attrib command is used to set the folder attributes and cacls is used to set the privilege label to deny access for members of administrators group. Sample Image:1 Once you have completed this task successfully you won’t be able to delete, rename, modify, copy or open these folders and this also prevent Malicious services running in any system to modify or copy infected files into Removable Drives.[/b] Sample Image:2 Sample Image:3 Originally Posted on whitehatGuru.net/blog
  5. Open cmd andType in the below command in CMD. Syntex: Netsh int ip set address/dns/wins “interface_name” source IP_address Subnet_mask default_gateway 1 Example: For Static IP Netsh int ip set address “Local Area Connection” static 192.168.1.2 255.255.255.0 192.168.1.1 1 For Static DNS Netsh int ip set dns “Local Area Connection” static 208.67.222.222 primary Netsh int ip set dns “Local Area Connection” static 208.67.202.202 secondary For Dynamic IP (DHCP) Netsh int ip set address “Local Area Connection” dhcp Netsh int ip set dns “Local Area Connection” dhcp
×
×
  • Create New...